Classification of Handwritten Signatures Based on Name Legibility
|
|
- Johnathan Hall
- 5 years ago
- Views:
Transcription
1 Classification of Handwritten Signatures Based on Name Legibility Javier Galbally, Julian Fierrez and Javier Ortega-Garcia Biometrics Research Lab./ATVS, EPS, Universidad Autonoma de Madrid, Campus de Cantoblanco, C/ Francisco Tomas y Valiente 11, Madrid, Spain ABSTRACT An automatic classification scheme of on-line handwritten signatures is presented. A Multilayer Perceptron (MLP) with a hidden layer is used as classifier, and two different signature classes are considered, namely: legible and non-legible name. Signatures are represented considering different feature subsets obtained from global information. Mahalanobis distance is used to rank the parameters and feature selection is then applied based on the top ranked features. Experimental results are given on the MCYT signature database comprising 330 signers. It is shown experimentally that automatic on-line signature classification based on the name legibility is feasible. Keywords: Biometrics, classification, on-line signature, neural network, verification 1. INTRODUCTION Thanks to its common use in many different applications, handwritten signature is one of the most widely accepted authentication methods. 1 It covers to some extent all of the main characteristics of a biometric trait (i.e., universality, distinctiveness, permanence and collectability 2 ) so it is feasible to develop automatic recognition systems based on it. 3, 4 Two main approaches to the representation of signatures have been reported in literature 5 : i) off-line: in which only the final result (i.e., the image) of the signature is available, 3 and ii) on-line: the signature is acquired with a special digitizing tablet which provides the temporal dynamics of the signature. 4 In this paper we will focus on the latter approach, in which much richer information about the signature is available. The present work is based on the so called occidental signatures. In opposition to other types of signatures consisting of independent symbols, such as the asian signatures, the occidental signatures consist of signs that could form concatenated text and some form of flourish. These can be classified according to different levels of complexity. In some countries the usual habit is to sign with readable written name, while in European countries signature must not necessarily have the readable written name of the signer and may only consist of an elaborated flourish. Examples of asian and occidental signatures can be found in the first International Signature Verification Competition. 6 In Fig. 1 we depict different examples of signatures from the MCYT database, which is used in the experiments. In the top row of Fig. 1 we can see some signatures in which the name is non-readable. The bottom row of Fig. 1 shows some readable signatures. Automatic signature verification systems have been shown to be sensitive to some extent to signature complexity. 7 Recognition rates of some systems drop when coping with easy to forge signatures which are normally the readable ones. Therefore an automatic classification scheme to separate between legible and non-legible signatures would be desirable in order to improve the general performance of the verification system. In this case two different recognition strategies could be applied for legible and non-legible signatures thus maximizing the overall recognition rate. Further author information: (Send correspondence to J.G.-H.) J.G.: javier.galbally@uam.es J.F.: julian.fierrez@uam.es J.O.-G.: javier.ortega@uam.es
2 Figure 1. Signature examples of non-readable (top row) and readable signatures (bottom row). From a privacy point of view, signatures in which the name of the signer is readable could involve a special treatment to protect the identity of the signer. From this perspective, an automatic legibility classification system would be relevant in order to adopt different measures for each signature depending on the specific legal guidelines for privacy protection of each country. 8 This paper is structured as follows. Some related works are presented in Sect. 2. In Sect. 3 we detail the classification scheme followed, which is divided into feature extraction and selection, and neural network classifier. The experimental protocol, some results and further discussion are reported in Sect. 4. Conclusions are finally drawn in Sect RELATED WORKS Some similar efforts to the classification problem introduced in this paper have been made in previous works. In 9 a classification scheme based on two consecutive classifiers is applied to handwritten text. In this work an initial pre-classification is made to discriminate between potentially problematic characters (such as S and 5 ) and then a specific adapted classifier is used for each one of these classes. In a similar way the present work proposes a pre-classification step which may be applied to signature verification in order to apply the most suitable recognition strategy to each signature class. In 10 a new authentication method based on written symbols is introduced and its discriminant capacity is compared to that of signatures. In one of the experiments reported a classifier is used for personal identification in a database in which symbols and signatures are mixed together. Although only one classifier is applied to the whole database, the process could be divided in two different steps: a first step in which symbols are separated from signatures (similar to the legibility classification problem introduced in the present work), and a second step in which each symbol/signature is recognized. An automatic classification system for Tablet PC environments is presented in. 11 In this work experiments using a HMM model are carried out in order to distinguish between graphics and handwritten text in on-line handwritten documents. This is the closest work to the proposed legibility classification scheme found in the literature Feature Extraction 3. CLASSIFICATION SCHEME In the literature we can mainly find two different approaches to the problem of extracting relevant information from on-line signature data 12 :
3 Table 1. Set of global features considered in this work sorted by individual discriminative power. Some notation considerations are: T denotes time interval, t denotes time instant, N denotes number of events, v denotes velocity and a denotes acceleration. Ranking Feature Description Ranking Feature Description 1 signature total duration T s 2 N(pen-ups) 3 N(sign changes of dx/dt and dy/dt) 4 average jerk j 5 standard deviation of a y 6 standard deviation of v y 7 (standard deviation of y)/ y 8 N(local maxima in x) 9 standard deviation of a x 10 standard deviation of v x 11 j rms 12 N(local maxima in y) 13 t(2nd pen-down)/t s 14 (average velocity v)/v x,max 15 A min =(y max y min )(x max x min ) ( x= P pen-downs i=1 (x max i x min i )) y 16 (x last pen-up x max )/ x 17 (x 1st pen-down x min )/ x 18 (y last pen-up y min )/ y 19 (y 1st pen-down y min )/ y 20 (T w v)/(y max y min ) Function-based approaches, in which time sequences describing local properties of the signature are used for recognition. 13 Feature-based approaches, in which a holistic vector representation consisting of global features is derived from the acquired signature trajectories. 14 In the present work, in order to classify the on-line signatures based on name legibility, we focus on the latter approaches. The device used in the signature acquisition process was a WACOM pen tablet which provided five different discrete-time dynamic sequences. In the experiments only features extracted from the first three sequences were used, the two involving angles were discarded as they have shown to be very unstable in some recognition systems. 4 The five dynamic sequences are: Position in x-axis. Position in y-axis. Pressure p applied by the pen. Azimuth angle of the pen with respect to the tablet. Altitude angle of the pen with respect to the tablet. The complete set of global features used in the experiments is given in Table 1. This group of parameters is a subset of the features considered in. 4 The work described in 4 was also carried out on the MCYT database, where users were asked to sign within a grid, so a controlled signature acquisition is assumed in order to reduce as much as possible the undesired effects produced by non-invariant translation/rotation features. In case of a non-controlled acquisition environment, translation/rotation registration should be performed before computing the feature set. The features in Table 1 are sorted according to the Mahalanobis distance criterion described in Sect All the features were normalized to zero mean and unit variance before using them as the input to the classifier.
4 3.2. Feature Selection In order to check for possible improvements in the recognition rate depending on the number of features selected as input to the classifier, all the 20 parameters considered have been ranked according to scalar inter-user class separability as described in. 4 Feature selection is then based on the top ranked features. The ranking criterion is based on the maximization of expression S(F k ) = d M i,f k d M j,f k, (1) i=1 j=1 where d M i,f k is the Mahalanobis distance between the F k -parameterized training signatures of client i and the mean of the F k -parameterized complete set of development signatures Neural Network Classifier The proposed classifier is a Multilayer Perceptron (MLP) with one hidden layer of M elements, and a backpropagation training scheme. The input layer is formed by N elements (being N the cardinality of the selected subset of features) with just two neurons in the output layer. The activation functions for each of the layers are: In the hidden layer a hiperbolic tangent: f(u) = a tanh(b u). In the output layer a sigmoid: g(u) = 1/(1 + e u ). In both cases a weighted linear combination is adopted for the net function of each neuron i: u = L wjy i j i + θ i, (2) j=1 where yj i is the j-th input of neuron i, wi j the corresponding weight to that input, L {M, N} is the number of elements of the previous layer and θ i is the bias used to model the threshold. The number of weights to be computed in the training of the MLP can be calculated as NM + 2M, being M + 2 the number of bias elements. In order to get linear performance of the classifier in the [-1,1] range, the two parameters a and b of the hidden layer activation function were computed following the directives given in 15 : a = and b = 2/ Database 4. EXPERIMENTS MCYT bimodal database involves fingerprint and signature traits 16 and it comprises 330 individuals acquired in the four institutions participating in the MCYT project. Approximately half of the donors were captured in the first institution and the other half in the remaining three. In the experiments carried out for the present paper only the signature subcorpus of the MCYT bimodal database is used. Each of the 330 target users produced 25 genuine signatures, and 25 skilled forgeries. In this work we use all of the = 8250 original signatures and no forgeries. In 16 an in depth description of the MCYT database with details of the software used and the acquisition process can be found. Example data from the MCYT Signature database are shown in Fig. 2.
5 Elev Elev Elev Az Az Az P P P Y Y Y X X X t (sec) t (sec) t (sec) Figure 2. Signature examples from MCYT Signature database together with their dynamic sequences captured with a WACOM pen tablet Experimental Protocol All the 8250 signatures considered in the experiments were labeled by hand as legible or non-legible. The network output [O 1 O 2 ]=[0 1] was assigned to non-legible signatures (class C 0 ), and [O 1 O 2 ]=[1 0] to legible signatures (class C 1 ). Both outputs of the Neural Network, O 1 and O 2, are real numbers in the [0,1] range. The final decision rule is as follows: If O 1 < O 2 X is assigned to C 0 If O 1 > O 2 X is assigned to C 1 where X is the pattern (signature) to be classified. Both classes are approximately a priori equally probable (162 signatures were manually assigned to class C 0 and 168 to class C 1 ). Note that the legibility of a signature is subjective and that two different persons might include the same signature in different classes. Thus, a perfect recognition rate can not be expected from any classifier. The MLP classification performance measures have been computed using 2-fold cross-validation as follows: 1. A first recognition rate T 1 is computed using the first half of the patterns (i.e., patterns from 1 to 165) for the training of the Neural Network using the manually labeled ground truth, and the second half (that is patterns from 166 to 330) for testing. 2. A second recognition rate T 2 is computed the opposite way as T 1, i.e. the second half of the patterns is used for the training and the first half for the testing. 3. The final recognition rate of the classifier was obtained linearly combining the previous two, T = T 1 + T 2. (3) 2
6 4.3. Results In Table 2 the recognition rates for increasing values of N (number of features for each signature) and M (number of elements in the hidden layer of the MLP) are given. We first observe from Table 2 that up to N = 15 the recognition rate increases with the number of features selected as input to the MLP. However, once this point is reached more input features worsens the classifier performance. This effect is depicted on the left plot of Fig. 3, where results for fixed M = 5 are given. In this plot we can see a maximum in the performance of the classifier for N = 15. In Table 2 we can also observe an over-fitting effect, as the training set recognition rate increases with the number of elements of the hidden layer, while the recognition rate for the test set reaches a maximum for M = 5 and then decreases. This effect is depicted in the right plot of Fig. 3 where the solid line shows the recognition rate on the test set (with a maximum in M = 5) and the dashed line shows the recognition rate on the training set. These results were obtained with fixed N = 15. From the previous observations the best configuration of the MLP is N = 15 and M = 5. architecture a recognition rate of % is reached. With this Further experiments for this same configuration were carried out changing the test and training sets selection scheme. Again a 2-fold cross-validation strategy was followed. In this case T 1 was computed using signatures from the odd users for training the neural network, and signatures from the even users as the test set. T 2 was computed exchanging both sets of data. This way we avoid the mismatch resulting from using all the signatures of the database acquired in one institution (the first 145 users, as described in Sect. 4.1) for the training and the signatures from other sites as testing data. With this testing strategy the classifier performance was % Dicussion As remarked before the on-line signature legibility classification problem is subject to human opinion: even two different experts would not label all signatures in the same class. As an example signatures in Fig. 4, which were wrongly classified by the MLP, do not clearly belong to either of the classes. Signatures from the top row were manually labeled as non-legible, however some signs that could be interpreted as readable text can be observed. The classifier assigned them to class C 1 (legible). Although the name is not clearly legible, signatures from the bottom row were labeled as legible while the MLP interpreted them as non-legible. 5. CONCLUSIONS An automatic on-line signature classification system was presented. Two different classes were considered, namely: legible and non-legible, and a Multilayer Perceptron (MLP) with a hidden layer was used as classifier. Signatures were parameterized considering different feature subsets obtained from global information and results were given on the whole MCYT signature database (330 signers). It has been shown experimentally that automatic on-line signature legibility classification is feasible. In order to increase recognition rates the system is being improved by the incorporation of local information of the signatures. This type of system could be helpful as a pre-processing step in signature verification systems or in privacy-preserving related applications. ACKNOWLEDGMENTS J. G.-H. is supported by a FPU Fellowship from the Ministerio de Educacion y Ciencia (Spanish Ministry of Science) and J. F.-A. is supported by a FPI Fellowship from Comunidad de Madrid. This work was supported by the Spanish Ministry of Science and Technology under project TIC C05-01 and the European Network of Excellence Biosecure (IST ).
7 Table 2. Classification performance of the MLP for increasing values of N (number of features) and M (number of elements in the hidden layer). Recognition rates on the test set appear in bold and on the train set in plain text. M N CURSE OF DIMENSIONALITY 95 Test Train OVER FITTING Recognition rate 75 Recognition rate N M Figure 3. Graphics of the curse of dimensionality (left) and over-fitting (right) effects observed in the experiments.
8 Figure 4. Signature examples wrongly classified using the best classifier configuration. In the top row signatures that were manually labeled in class C 0 (non-legible) and were assigned to class C 1 by the MLP are shown. The opposite error occurred on signatures shown in the bottom row. REFERENCES 1. M. C. Fairhurst, Signature verification revisited: promoting practical exploitation of biometric technology, Electronics and Communication Engineering Journal 9, pp , December A. K. Jain, A. Ross, and S. Prabhakar, An introduction to biometric recognition, IEEE Trans. on Circuits and Systems for Video Technology 14, pp. 4 20, January J. Fierrez-Aguilar, N. Alonso-Hermira, G. Moreno-Marquez, and J. Ortega-Garcia, An off-line signature verification system based on fusion of local and global information, in BIOAW, LNCS-3087, pp , Springer, J. Fierrez-Aguilar, L. Nanni, J. Lopez-Penalba, J. Ortega-Garcia, and D. Maltoni, An on-line signature verification system based on fusion of local and global information, in AVBPA, LNCS-3546, pp , Springer, R. Plamondon and S. N. Srihari, On-line and off-line handwriting recognition: a comprehensive survey, IEEE Trans. on Pattern Analysis and Machine Intelligence 22, pp , January D.-Y. Yeung, H. Chang, et al., SVC2004: First International Signature Verification Competition, in ICBA, LNCS-3072, pp , Springer, J. Fierrez-Aguilar, J. Ortega-Garcia, and J. Gonzalez-Rodriguez, Target dependent score normalization techniques and their application to signature verification, IEEE Trans. on Systems, Man, and Cybernetics 35, pp , M. Rejman-Greene, Biometric systems: technology, design and performance evalutation, ch. Privacy issues in the application of biometrics: a European perspective, pp Springer, M. Fairhurst and A. F. Rahman, Generalised approach to the recognition of structurally similar handwritten characters using multiple expert clasifiers, IEE Proc. Vis. Image Signal Process. 144, pp , February M. G. Lizarraga and L. L. Ling, Biometric personal authentication based on handwritten signals, in ICBA, LNCS-3072, pp , Springer, C. M. Bishop, M. Svensen, and G. E. Hilton, Distinguishing text form graphics in on-line handwritten ink, in IWFHR-9, 2004.
9 12. R. Plamondon and G. Lorette, Automatic signature verification and writer identification: The state of the art, Pattern Recognition 22(2), pp , J. Ortega-Garcia, J. Fierrez-Aguilar, J. Martin-Rello, and J. Gonzalez-Rodriguez, Complete signal modeling and score normalization for function-based dynamic signature verification, in Proc. AVBPA, LNCS- 2688, pp , L. L. Lee, T. Berger, and E. Aviczer, Reliable on-line human signature verification systems, Pattern Analysis and Machine Intelligence 18, pp , S. Haykin, Neural networks: a comprehensive foundation, ch. Multilayer Perceptrons, pp Prentice Hall, J. Ortega-Garcia, J. Fierrez-Aguilar, et al., MCYT baseline corpus: a bimodal biometric database, IEE Proc. Vis. Image Signal Process. 150, pp , December 2003.
IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.
IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,
More informationComplexity-based Biometric Signature Verification
Complexity-based Biometric Signature Verification Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analytics (BiDA) Lab - ATVS, Escuela
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,
More informationSVC2004: First International Signature Verification Competition
SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University
More informationClassification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System
Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Conf. on Biometrics: Theory, Applications and Systems, BTAS, Washington DC, USA, 27-29 Sept., 27. Citation
More informationEvaluating the Biometric Sample Quality of Handwritten Signatures
Evaluating the Biometric Sample Quality of Handwritten Signatures Sascha Müller 1 and Olaf Henniger 2 1 Technische Universität Darmstadt, Darmstadt, Germany mueller@sec.informatik.tu-darmstadt.de 2 Fraunhofer
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 2nd IEEE International Conference on Biometrics - Theory, Applications and Systems (BTAS 28), Washington, DC, SEP.
More informationA novel method to generate Brute-Force Signature Forgeries
A novel method to generate Brute-Force Signature Forgeries DIUF-RR 274 06-09 Alain Wahl 1 Jean Hennebert 2 Andreas Humm 3 Rolf Ingold 4 June 12, 2006 Department of Informatics Research Report Département
More informationApply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition
www.ijcsi.org 261 Apply Multi-Layer Perceptrons eural etwork for Off-line signature verification and recognition Suhail Odeh and Manal Khalil Computer And Information Systems Department, Bethlehem University
More informationStatic Signature Verification and Recognition using Neural Network Approach-A Survey
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network
More informationEnhanced MLP Input-Output Mapping for Degraded Pattern Recognition
Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Shigueo Nomura and José Ricardo Gonçalves Manzan Faculty of Electrical Engineering, Federal University of Uberlândia, Uberlândia, MG,
More informationDirect Attacks Using Fake Images in Iris Verification
Direct Attacks Using Fake Images in Iris Verification Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia Biometric Recognition
More informationBackground Pixel Classification for Motion Detection in Video Image Sequences
Background Pixel Classification for Motion Detection in Video Image Sequences P. Gil-Jiménez, S. Maldonado-Bascón, R. Gil-Pita, and H. Gómez-Moreno Dpto. de Teoría de la señal y Comunicaciones. Universidad
More informationA comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
Proc. National Conference on Recent Trends in Intelligent Computing (2006) 86-92 A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
More informationWriter identification clustering letters with unknown authors
Writer identification clustering letters with unknown authors Joanna Putz-Leszczynska To cite this version: Joanna Putz-Leszczynska. Writer identification clustering letters with unknown authors. 17th
More informationOnline handwritten signature verification system: A Review
Online handwritten signature verification system: A Review Abstract: Online handwritten signature verification system is one of the most reliable, fast and cost effective tool for user authentication.
More informationIAPR Young Biometrics Investigator Award IJCB 2017 Keynote Talk. Julian FIERREZ
IAPR Young Biometrics Investigator Award IJCB 2017 Keynote Talk Julian FIERREZ [https://atvs.ii.uam.es/fierrez] School of Engineering UNIVERSIDAD AUTONOMA DE MADRID, SPAIN Denver CO, USA, Oct. 3, 2017
More informationFigure 1. Artificial Neural Network structure. B. Spiking Neural Networks Spiking Neural networks (SNNs) fall into the third generation of neural netw
Review Analysis of Pattern Recognition by Neural Network Soni Chaturvedi A.A.Khurshid Meftah Boudjelal Electronics & Comm Engg Electronics & Comm Engg Dept. of Computer Science P.I.E.T, Nagpur RCOEM, Nagpur
More informationBiometric Signature for Mobile Devices
Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2
More informationIncorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits
Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analtics (BiDA)
More informationAn Hybrid MLP-SVM Handwritten Digit Recognizer
An Hybrid MLP-SVM Handwritten Digit Recognizer A. Bellili ½ ¾ M. Gilloux ¾ P. Gallinari ½ ½ LIP6, Université Pierre et Marie Curie ¾ La Poste 4, Place Jussieu 10, rue de l Ile Mabon, BP 86334 75252 Paris
More informationNikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using
More informationOnline Signature Verification on Mobile Devices
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Online Signature Verification on Mobile Devices Miss. Hude. Kalyani. A. Miss. Khande
More informationHuman-Computer Interaction for Biometrics
Human-Computer Interaction for Biometrics Prof. Julian FIERREZ Universidad Autonoma de Madrid - SPAIN http://atvs.ii.uam.es/fierrez Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide
More informationOffline Signature Verification for Cheque Authentication Using Different Technique
Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi
More informationEvaluation of Online Signature Verification Features
Evaluation of Online Signature Verification Features Ghazaleh Taherzadeh*, Roozbeh Karimi*, Alireza Ghobadi*, Hossein Modaberan Beh** * Faculty of Information Technology Multimedia University, Selangor,
More informationSegmentation of Fingerprint Images
Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands
More informationIdentity and Message recognition by biometric signals
Identity and Message recognition by biometric signals J. Bigun, F. Alonso-Fernandez, S. M. Karlsson, A. Mikaelyan Abstract The project addresses visual information representation, and extraction. The problem
More informationDERIVATION OF TRAPS IN AUDITORY DOMAIN
DERIVATION OF TRAPS IN AUDITORY DOMAIN Petr Motlíček, Doctoral Degree Programme (4) Dept. of Computer Graphics and Multimedia, FIT, BUT E-mail: motlicek@fit.vutbr.cz Supervised by: Dr. Jan Černocký, Prof.
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationThe Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification
Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Parallel to AIMA 8., 8., 8.6.3, 8.9 The Automatic Classification Problem Assign object/event or sequence of objects/events
More informationOnline Signature Verification: A Review
J. Appl. Environ. Biol. Sci., 4(9S)303-308, 2014 2014, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Online Signature Verification: A Review
More informationReal time verification of Offline handwritten signatures using K-means clustering
Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationA new seal verification for Chinese color seal
Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558
More informationUTSig: A Persian Offline Signature Dataset
UTSig: A Persian Offline Signature Dataset Amir Soleimani 1*, Kazim Fouladi 2, Babak N. Araabi 1, 3 1 Control and Intelligent Processing Center of Excellence, School of Electrical and Computer Engineering,
More informationA Study of Distortion Effects on Fingerprint Matching
A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department
More informationPattern Recognition in Blur Motion Noisy Images using Fuzzy Methods for Response Integration in Ensemble Neural Networks
Pattern Recognition in Blur Motion Noisy Images using Methods for Response Integration in Ensemble Neural Networks M. Lopez 1, 2 P. Melin 2 O. Castillo 2 1 PhD Student of Computer Science in the Universidad
More informationShape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram
Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Kiwon Yun, Junyeong Yang, and Hyeran Byun Dept. of Computer Science, Yonsei University, Seoul, Korea, 120-749
More informationHandwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON)
Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON) Parveen Kumar Department of E.C.E Lecturer, NCCE Israna Nitin Sharma Department of E.C.E
More informationIJITKMI Volume 7 Number 2 Jan June 2014 pp (ISSN ) Impact of attribute selection on the accuracy of Multilayer Perceptron
Impact of attribute selection on the accuracy of Multilayer Perceptron Niket Kumar Choudhary 1, Yogita Shinde 2, Rajeswari Kannan 3, Vaithiyanathan Venkatraman 4 1,2 Dept. of Computer Engineering, Pimpri-Chinchwad
More informationThe Use of Static Biometric Signature Data from Public Service Forms
The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk
More informationSynergy Model of Artificial Intelligence and Augmented Reality in the Processes of Exploitation of Energy Systems
Journal of Energy and Power Engineering 10 (2016) 102-108 doi: 10.17265/1934-8975/2016.02.004 D DAVID PUBLISHING Synergy Model of Artificial Intelligence and Augmented Reality in the Processes of Exploitation
More informationFingerDOS: A Fingerprint Database Based on Optical Sensor
FingerDOS: A Fingerprint Database Based on Optical Sensor FLORENCE FRANCIS-LOTHAI 1, DAVID B. L. BONG 2 1, 2 Faculty of Engineering Universiti Malaysia Sarawak 94300 Kota Samarahan MALAYSIA 1 francislothaiflorence@gmail.com,
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More informationAutomatic Speech Recognition (CS753)
Automatic Speech Recognition (CS753) Lecture 9: Brief Introduction to Neural Networks Instructor: Preethi Jyothi Feb 2, 2017 Final Project Landscape Tabla bol transcription Music Genre Classification Audio
More informationArtificial Neural Networks. Artificial Intelligence Santa Clara, 2016
Artificial Neural Networks Artificial Intelligence Santa Clara, 2016 Simulate the functioning of the brain Can simulate actual neurons: Computational neuroscience Can introduce simplified neurons: Neural
More informationColored Rubber Stamp Removal from Document Images
Colored Rubber Stamp Removal from Document Images Soumyadeep Dey, Jayanta Mukherjee, Shamik Sural, and Partha Bhowmick Indian Institute of Technology, Kharagpur {soumyadeepdey@sit,jay@cse,shamik@sit,pb@cse}.iitkgp.ernet.in
More informationPartial Discharge Classification Using Novel Parameters and a Combined PCA and MLP Technique
Partial Discharge Classification Using Novel Parameters and a Combined PCA and MLP Technique C. Chang and Q. Su Center for Electrical Power Engineering Monash University, Clayton VIC 3168 Australia Abstract:
More informationChapter 2 Transformation Invariant Image Recognition Using Multilayer Perceptron 2.1 Introduction
Chapter 2 Transformation Invariant Image Recognition Using Multilayer Perceptron 2.1 Introduction A multilayer perceptron (MLP) [52, 53] comprises an input layer, any number of hidden layers and an output
More informationAn Offline Handwritten Signature Verification System - A Comprehensive Review
An Offline Handwritten Signature Verification System - A Comprehensive Review Ms. Deepti Joon 1, Ms. Shaloo Kikon 2 1 M. Tech. Scholar, Dept. of ECE, P.D.M. College of Engineering, Bahadurgarh, Haryana
More informationAutomated Signature Detection from Hand Movement ¹
Automated Signature Detection from Hand Movement ¹ Mladen Savov, Georgi Gluhchev Abstract: The problem of analyzing hand movements of an individual placing a signature has been studied in order to identify
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationTarget Classification in Forward Scattering Radar in Noisy Environment
Target Classification in Forward Scattering Radar in Noisy Environment Mohamed Khala Alla H.M, Mohamed Kanona and Ashraf Gasim Elsid School of telecommunication and space technology, Future university
More informationAn Algorithm for Fingerprint Image Postprocessing
An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most
More informationA Novel Fiber Optic Based Surveillance System for Prevention of Pipeline Integrity Threats
sensors Article A Novel Fiber Optic Based Surveillance System for Prevention of Pipeline Integrity Threats Javier Tejedor 1,, Javier Macias-Guarasa 2, *, Hugo F. Martins 1, Daniel Piote 1, Juan Pastor-Graells
More informationEffective and Efficient Fingerprint Image Postprocessing
Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg
More informationCurrent Harmonic Estimation in Power Transmission Lines Using Multi-layer Perceptron Learning Strategies
Journal of Electrical Engineering 5 (27) 29-23 doi:.7265/2328-2223/27.5. D DAVID PUBLISHING Current Harmonic Estimation in Power Transmission Lines Using Multi-layer Patrice Wira and Thien Minh Nguyen
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationA Data-Embedding Pen
A Data-Embedding Pen Seiichi Uchida Λ, Kazuhiro Tanaka Λ, Masakazu Iwamura ΛΛ, Shinichiro Omachi ΛΛΛ, Koichi Kise ΛΛ Λ Kyushu University, Fukuoka, Japan. ΛΛ Osaka Prefecture University, Osaka, Japan. ΛΛΛ
More informationUsing RASTA in task independent TANDEM feature extraction
R E S E A R C H R E P O R T I D I A P Using RASTA in task independent TANDEM feature extraction Guillermo Aradilla a John Dines a Sunil Sivadas a b IDIAP RR 04-22 April 2004 D a l l e M o l l e I n s t
More informationDisruption Classification at JET with Neural Techniques
EFDA JET CP(03)01-65 M. K. Zedda, T. Bolzonella, B. Cannas, A. Fanni, D. Howell, M. F. Johnson, P. Sonato and JET EFDA Contributors Disruption Classification at JET with Neural Techniques . Disruption
More informationProceedings of the 2014 Federated Conference on Computer Science and Information Systems pp
Proceedings of the 204 Federated Conference on Computer Science and Information Systems pp. 70 708 DOI: 0.5439/204F59 ACSIS, Vol. 2 Handwritten Signature Verification with 2D Color Barcodes Marco Querini,
More informationLive Hand Gesture Recognition using an Android Device
Live Hand Gesture Recognition using an Android Device Mr. Yogesh B. Dongare Department of Computer Engineering. G.H.Raisoni College of Engineering and Management, Ahmednagar. Email- yogesh.dongare05@gmail.com
More informationAnalyzing features learned for Offline Signature Verification using Deep CNNs
Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence
More informationBackground Subtraction Fusing Colour, Intensity and Edge Cues
Background Subtraction Fusing Colour, Intensity and Edge Cues I. Huerta and D. Rowe and M. Viñas and M. Mozerov and J. Gonzàlez + Dept. d Informàtica, Computer Vision Centre, Edifici O. Campus UAB, 08193,
More informationA Novel Fuzzy Neural Network Based Distance Relaying Scheme
902 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 15, NO. 3, JULY 2000 A Novel Fuzzy Neural Network Based Distance Relaying Scheme P. K. Dash, A. K. Pradhan, and G. Panda Abstract This paper presents a new
More informationAN ANN BASED FAULT DETECTION ON ALTERNATOR
AN ANN BASED FAULT DETECTION ON ALTERNATOR Suraj J. Dhon 1, Sarang V. Bhonde 2 1 (Electrical engineering, Amravati University, India) 2 (Electrical engineering, Amravati University, India) ABSTRACT: Synchronous
More informationHandwritten Signature Verification by Multiple Reference Sets
Handwritten Signature Verification by Multiple s D. Impedovo (^)( ), R. Modugno (*)( ),G. Pirlo (*)( ) (*) ( ), E. Stasolla (*) Dipartimento di Informatica Università degli Studi di Bari Via Orabona 4
More informationTransactions on Information and Communications Technologies vol 1, 1993 WIT Press, ISSN
Combining multi-layer perceptrons with heuristics for reliable control chart pattern classification D.T. Pham & E. Oztemel Intelligent Systems Research Laboratory, School of Electrical, Electronic and
More informationA Comparison of Particle Swarm Optimization and Gradient Descent in Training Wavelet Neural Network to Predict DGPS Corrections
Proceedings of the World Congress on Engineering and Computer Science 00 Vol I WCECS 00, October 0-, 00, San Francisco, USA A Comparison of Particle Swarm Optimization and Gradient Descent in Training
More informationNeural Network Classifier and Filtering for EEG Detection in Brain-Computer Interface Device
Neural Network Classifier and Filtering for EEG Detection in Brain-Computer Interface Device Mr. CHOI NANG SO Email: cnso@excite.com Prof. J GODFREY LUCAS Email: jglucas@optusnet.com.au SCHOOL OF MECHATRONICS,
More informationAbout user acceptance in hand, face and signature biometric systems
About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación
More informationDIAGNOSIS OF STATOR FAULT IN ASYNCHRONOUS MACHINE USING SOFT COMPUTING METHODS
DIAGNOSIS OF STATOR FAULT IN ASYNCHRONOUS MACHINE USING SOFT COMPUTING METHODS K. Vinoth Kumar 1, S. Suresh Kumar 2, A. Immanuel Selvakumar 1 and Vicky Jose 1 1 Department of EEE, School of Electrical
More informationforensic document examination of electronically captured signatures
Article: forensic document examination of electronically captured signatures By Heidi H. Harralson Biodynamic signature systems are a means by which a person provides a signature in electronic format that
More informationA New Fake Iris Detection Method
A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn
More informationEvaluation of Waveform Structure Features on Time Domain Target Recognition under Cross Polarization
Journal of Physics: Conference Series PAPER OPEN ACCESS Evaluation of Waveform Structure Features on Time Domain Target Recognition under Cross Polarization To cite this article: M A Selver et al 2016
More informationSignature authentication based on human intervention: performance and complementarity with automatic systems
IET Biometrics Special Issue: Selected Papers from the International Workshop on Biometrics and Forensics (IWBF2016) Signature authentication based on human intervention: performance and complementarity
More informationOnline Signature Verification by Using FPGA
Online Signature Verification by Using FPGA D.Sandeep Assistant Professor, Department of ECE, Vignan Institute of Technology & Science, Telangana, India. ABSTRACT: The main aim of this project is used
More informationPreprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition
Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,
More informationSonia Sharma ECE Department, University Institute of Engineering and Technology, MDU, Rohtak, India. Fig.1.Neuron and its connection
NEUROCOMPUTATION FOR MICROSTRIP ANTENNA Sonia Sharma ECE Department, University Institute of Engineering and Technology, MDU, Rohtak, India Abstract: A Neural Network is a powerful computational tool that
More informationDifferentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern
Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern Chisako Muramatsu 1, Min Zhang 1, Takeshi Hara 1, Tokiko Endo 2,3, and Hiroshi Fujita 1 1 Department of Intelligent
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationIris Recognition-based Security System with Canny Filter
Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role
More informationIBM SPSS Neural Networks
IBM Software IBM SPSS Neural Networks 20 IBM SPSS Neural Networks New tools for building predictive models Highlights Explore subtle or hidden patterns in your data. Build better-performing models No programming
More information3D Face Recognition in Biometrics
3D Face Recognition in Biometrics CHAO LI, ARMANDO BARRETO Electrical & Computer Engineering Department Florida International University 10555 West Flagler ST. EAS 3970 33174 USA {cli007, barretoa}@fiu.edu
More informationNeural Filters: MLP VIS-A-VIS RBF Network
6th WSEAS International Conference on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, Dec 29-31, 2007 432 Neural Filters: MLP VIS-A-VIS RBF Network V. R. MANKAR, DR. A. A. GHATOL,
More informationAcoustic Emission Source Location Based on Signal Features. Blahacek, M., Chlada, M. and Prevorovsky, Z.
Advanced Materials Research Vols. 13-14 (6) pp 77-82 online at http://www.scientific.net (6) Trans Tech Publications, Switzerland Online available since 6/Feb/15 Acoustic Emission Source Location Based
More informationMULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE
MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,
More informationResearch Article Online Handwritten Signature Verification Using Neural Network Classifier Based on Principal Component Analysis
e Scientific World Journal, Article ID 381469, 8 pages http://dx.doi.org/10.1155/2014/381469 Research Article Online Handwritten Signature Verification Using Neural Network Classifier Based on Principal
More informationJoint recognition and direction-of-arrival estimation of simultaneous meetingroom acoustic events
INTERSPEECH 2013 Joint recognition and direction-of-arrival estimation of simultaneous meetingroom acoustic events Rupayan Chakraborty and Climent Nadeu TALP Research Centre, Department of Signal Theory
More informationAdaptive Fingerprint Binarization by Frequency Domain Analysis
Adaptive Fingerprint Binarization by Frequency Domain Analysis Josef Ström Bartůněk, Mikael Nilsson, Jörgen Nordberg, Ingvar Claesson Department of Signal Processing, School of Engineering, Blekinge Institute
More informationHaptic Passwords. Junjie Yan, Kevin Huang, Tamara Bonaci and Howard J. Chizeck
Haptic Passwords Junjie Yan, Kevin Huang, Tamara Bonaci and Howard J. Chizeck Abstract Haptic technologies have made it possible for human users to interact with cyber systems not only via traditional
More informationMotion Recognition in Wearable Sensor System Using an Ensemble Artificial Neuro-Molecular System
Motion Recognition in Wearable Sensor System Using an Ensemble Artificial Neuro-Molecular System Si-Jung Ryu and Jong-Hwan Kim Department of Electrical Engineering, KAIST, 355 Gwahangno, Yuseong-gu, Daejeon,
More informationScalable systems for early fault detection in wind turbines: A data driven approach
Scalable systems for early fault detection in wind turbines: A data driven approach Martin Bach-Andersen 1,2, Bo Rømer-Odgaard 1, and Ole Winther 2 1 Siemens Diagnostic Center, Denmark 2 Cognitive Systems,
More informationAN APPROACH ON RECOGNITION OF HAND-WRITTEN LETTERS
AN APPROACH ON RECOGNITION OF HAND-WRITTEN LETTERS Ahmet ÇINAR, Erdal ÖZBAY Fırat University Faculty Of Engineering Computer Engineering 23119 Elazig TURKEY acinar@firat.edu.tr Abstract In this study,
More informationApplication of Classifier Integration Model to Disturbance Classification in Electric Signals
Application of Classifier Integration Model to Disturbance Classification in Electric Signals Dong-Chul Park Abstract An efficient classifier scheme for classifying disturbances in electric signals using
More informationUSING EMBEDDED PROCESSORS IN HARDWARE MODELS OF ARTIFICIAL NEURAL NETWORKS
USING EMBEDDED PROCESSORS IN HARDWARE MODELS OF ARTIFICIAL NEURAL NETWORKS DENIS F. WOLF, ROSELI A. F. ROMERO, EDUARDO MARQUES Universidade de São Paulo Instituto de Ciências Matemáticas e de Computação
More informationRoll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database
Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using
More information